메뉴 건너뛰기




Volumn 435 LNCS, Issue , 1990, Pages 218-238

A certified digital signature

Author keywords

Cryptography; Digital Signatures; Electronic Funds Transfer; Electronic Signatures; Public Key Cryptosystem; Receipts Authentication

Indexed keywords

AUTHENTICATION; ELECTRONIC DATA INTERCHANGE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PUBLIC KEY CRYPTOGRAPHY;

EID: 84969346266     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/0-387-34805-0_21     Document Type: Conference Paper
Times cited : (926)

References (13)
  • 2
    • 0016092372 scopus 로고
    • A user authentication system not requiring secrecy in the computer
    • Aug
    • Evans A., Kantrowitz, W., and Weiss, E. A user authentication system not requiring secrecy in the computer. Comm. ACM 17,8(Aug. 1974), 437-442.
    • (1974) Comm. ACM , vol.17 , Issue.8 , pp. 437-442
    • Evans, A.1    Kantrowitz, W.2    Weiss, E.3
  • 3
    • 85032861070 scopus 로고    scopus 로고
    • Using certificates for key distribution in a public-key cryptosystem
    • Kohnfelder, L.M. Using certificates for key distribution in a public-key cryptosystem. Private communication.
    • Private Communication
    • Kohnfelder, L.M.1
  • 4
    • 84915056094 scopus 로고
    • Making the digital signature legal-and safeguarded
    • Feb
    • Lipton, S.M., and Matyas, S.M. Making the digital signature legal-and safeguarded. Data Communications (Feb. 1978), 41-52.
    • (1978) Data Communications , pp. 41-52
    • Lipton, S.M.1    Matyas, S.M.2
  • 6
    • 0017959977 scopus 로고
    • Secure Communications over Insecure Channels
    • Apr
    • Merkle, R. Secure Communications over Insecure Channels. Comm. ACM 21,4(Apr. 1978), 294-299.
    • (1978) Comm. ACM , vol.21 , Issue.4 , pp. 294-299
    • Merkle, R.1
  • 7
    • 0018019325 scopus 로고
    • Hiding information and signatures in trapdoor knapsacks
    • Sept
    • Merkle, R., and Hellman, M. Hiding information and signatures in trapdoor knapsacks. IEEE Trans. on Inform. IT-24,5(Sept. 1978), 525-530.
    • (1978) IEEE Trans. on Inform , vol.IT-24 , Issue.5 , pp. 525-530
    • Merkle, R.1    Hellman, M.2
  • 8
    • 0017930809 scopus 로고
    • Method for obtaining digital signatures and public-key cryptosystems
    • Feb
    • Rivest, R.L., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21,2(Feb. 1978), 120-126.
    • (1978) Comm. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.A.3
  • 10
    • 0343598394 scopus 로고    scopus 로고
    • Constructing digital signatures from a one way function
    • Lamport, L., Constructing digital signatures from a one way function. SRI Intl. CSL-98
    • SRI Intl. CSL-98
    • Lamport, L.1
  • 11
    • 0001820140 scopus 로고
    • Cryptography and computer security
    • Feistel, H., Cryptography and computer security. Scientific American, 228(May 1973), 15-23.
    • (1973) Scientific American , vol.228 , pp. 15-23
    • Feistel, H.1
  • 12
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct
    • Shannon, C.E., Communication theory of secrecy systems. Bell Sys. Tech. Jour. 28(Oct. 1949) 656-715.
    • (1949) Bell Sys. Tech. Jour , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 13
    • 0010277907 scopus 로고
    • Digitalized signatures
    • R. Lipton and R. DeMillo, Eds., Academic Press, New York
    • Rabin, M.O., Digitalized signatures. In Foundations of Secure Computation, R. Lipton and R. DeMillo, Eds., Academic Press, New York, 1978, pp. 155-166.
    • (1978) Foundations of Secure Computation , pp. 155-166
    • Rabin, M.O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.